Gửi #605655: Portabilis i-Educar 2.9.0 Stored Cross Site Scriptingthông tin

tiêu đềPortabilis i-Educar 2.9.0 Stored Cross Site Scripting
Mô tảHello team! This vulnerability allows an attacker to store malicious JavaScript in the "Motivo" field of the calendar module. The payload is then executed whenever the listing page is accessed, impacting all users with access to this module. This can lead to: Session hijacking Credential theft Redirection to malicious websites Full browser compromise depending on browser/plugins/extensions 1. Log in Authenticate to the i-Educar platform using valid credentials. 2. Go to "Tipos de evento do calendário" Access the calendário via: Escola > Cadastro > Tipo > Calendário /intranet/educar_calendario_dia_motivo_lst.php 4. Edit or Create an "Calendário Dia Motivo - Listagem" Insert the XSS payload in the "Motivo" (nm_motivo) field: <script>alert('PoC VulDB i-Educar PaCXXX')</script> 4. Save the Appointment Click "Salvar". 5. Trigger the Payload Reopen the page — the script will execute.
Nguồn⚠️ https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README18.md
Người dùng
 RaulPACXXX (UID 84502)
Đệ trình27/06/2025 21:04 (cách đây 10 các tháng)
Kiểm duyệt19/07/2025 07:53 (21 days later)
Trạng tháiđược chấp nhận
Mục VulDB316981 [Portabilis i-Educar đến 2.10 Calendar educar_calendario_dia_motivo_cad.php Motivo/descricao Tập lệnh chéo trang]
điểm20

Do you need the next level of professionalism?

Upgrade your account now!